Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different… More >

  • Open Access

    ARTICLE

    Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment

    P. Nalayini1,*, R. Arun Prakash2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2033-2047, 2023, DOI:10.32604/csse.2023.028269

    Abstract Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things (IoT) services. After the emergence of IoT-based services, the industry of internet-based devices has grown. The number of these devices has raised from millions to billions, and it is expected to increase further in the near future. Thus, additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user… More >

  • Open Access

    ARTICLE

    Multi-attribute Group Decision-making Based on Hesitant Bipolar-valued Fuzzy Information and Social Network

    Dhanalakshmi R1, Sovan Samanta2, Arun Kumar Sivaraman3, Jeong Gon Lee4,*, Balasundaram A5, Sanamdikar Sanjay Tanaji6, Priya Ravindran7

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1939-1950, 2023, DOI:10.32604/csse.2023.026254

    Abstract Fuzzy sets have undergone several expansions and generalisations in the literature, including Atanasov’s intuitionistic fuzzy sets, type 2 fuzzy sets, and fuzzy multisets, to name a few. They can be regarded as fuzzy multisets from a formal standpoint; nevertheless, their interpretation differs from the two other approaches to fuzzy multisets that are currently available. Hesitating fuzzy sets (HFS) are very useful if consultants have hesitation in dealing with group decision-making problems between several possible memberships. However, these possible memberships can be not only crisp values in [0,1], but also interval values during a practical evaluation process. Hesitant bipolar valued fuzzy… More >

  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

  • Open Access

    ARTICLE

    Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT

    S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505

    Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >

  • Open Access

    ARTICLE

    Multi-Level Feature Aggregation-Based Joint Keypoint Detection and Description

    Jun Li1, Xiang Li1, Yifei Wei1,*, Mei Song1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2529-2540, 2022, DOI:10.32604/cmc.2022.029542

    Abstract Image keypoint detection and description is a popular method to find pixel-level connections between images, which is a basic and critical step in many computer vision tasks. The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors. This paper proposes a new end-to-end self-supervised training deep learning network. The network uses a backbone feature encoder to extract multi-level feature maps, then performs joint image keypoint detection and description in a forward pass. On the one hand, in order to enhance the localization accuracy of keypoints and restore the local shape… More >

  • Open Access

    ARTICLE

    Aczel-Alsina Weighted Aggregation Operators of Simplified Neutrosophic Numbers and Its Application in Multiple Attribute Decision Making

    Rui Yong1,2,*, Jun Ye1,2, Shigui Du1,2, Aqin Zhu1, Yingying Zhang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 569-584, 2022, DOI:10.32604/cmes.2022.019509

    Abstract The simplified neutrosophic number (SNN) can represent uncertain, imprecise, incomplete, and inconsistent information that exists in scientific, technological, and engineering fields. Hence, it is a useful tool for describing truth, falsity, and indeterminacy information in multiple attribute decision-making (MADM) problems. To suit decision makers’ preference selection, the operational flexibility of aggregation operators shows its importance in dealing with the flexible decision-making problems in the SNN environment. To solve this problem, this paper develops the Aczel-Alsina aggregation operators of SNNs for MADM problems in view of the Aczel-Alsina operational flexibility. First, we define the Aczel-Alsina operations of SNNs. Then, the Aczel-Alsina… More >

  • Open Access

    ARTICLE

    Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks

    Dae-Young Kim, Seokhoon Kim*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 727-737, 2023, DOI:10.32604/iasc.2023.027563

    Abstract As the Internet of Things (IoT) advances, machine-type devices are densely deployed and massive networks such as ultra-dense networks (UDNs) are formed. Various devices attend to the network to transmit data using machine-type communication (MTC), whereby numerous, various are generated. MTC devices generally have resource constraints and use wireless communication. In this kind of network, data aggregation is a key function to provide transmission efficiency. It can reduce the number of transmitted data in the network, and this leads to energy saving and reducing transmission delays. In order to effectively operate data aggregation in UDNs, it is important to select… More >

  • Open Access

    ARTICLE

    Cross-Tier Interference Mitigation in 3D HetNets for LTE and Wi-Fi Access

    M. Rekha1,*, M. Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1211-1227, 2023, DOI:10.32604/iasc.2023.027368

    Abstract Due to the unprecedented rate of transformation in the field of wireless communication industry, there is a need to prioritise the coverage, network power and throughput as preconditions. In Heterogeneous Networks (HetNets) the low power node inclusion like Femto and Pico cells creates a network of Multi-Tier (M-Tier) which is regarded as the most significant strategy for enhancing the coverage, throughput, 4G Long Term Evolution (LTE) ability. This work mainly focuses on M-Tier 3D Heterogeneous Networks Energy Efficiency (EE) based Carrier Aggregation (CA) scheme for streaming real-time huge data like images. At first, M-Tier 3D HetNets scheme was made for… More >

  • Open Access

    ARTICLE

    Aggregated PSO for Secure Data Transmission in WSN Using Fog Server

    M. Manicka Raja1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1017-1032, 2022, DOI:10.32604/iasc.2022.025665

    Abstract Privacy of data in Internet of Things (IoT) over fog networks is the biggest challenge in security of Wireless communication networks. In Wireless Sensor Network (WSN), current research on fog computing with IoT is gaining popularity among IoT devices over network. Moreover, the data aggregation will reduce the energy consumption in WSN. Due to the open and hostile nature of WSN, secure data aggregation is the major issue. The existing data aggregation methods in IoT and its associated approaches are lack of limited aggregation functions, heavyweight, issues related to the performance overhead. Besides, the overload on fog node will result… More >

Displaying 21-30 on page 3 of 65. Per Page